Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA & Teleport ACD

Back in 2024, Amazon Web Services (AWS) engaged Trail of Bits (ToB) to perform a comparative assessment between several authorization and access management policy languages. If you're unfamiliar with the concept of a policy engine, it's essentially a fully-featured engine that offloads authorization decisions in an application.

Phishing-as-a-Service (PhaaS): A Cybercrime Subscription Service

The cybersecurity threat landscape is constantly evolving, and Trustwave SpiderLabs has noted one of the fastest-growing threats is Phishing-as-a-Service (PhaaS). PhaaS platforms have become the go-to tool for cybercriminals to launch sophisticated phishing campaigns targeting the general public and businesses. Much like legitimate software-as-a-service platforms, PhaaS offers cybercriminals subscription-based access to powerful phishing tools—without requiring advanced technical skills.

Addressing API Security with NIST SP 800-228

According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer treat API security as a sidenote; it’s time to treat it as the main event. NIST seems to be on board with this view, releasing the initial public draft of NIST SP 800-228, a set of recommendations for securing APIs.

Ditch the VPN. Upgrade Your Access with Netskope One Private Access

Old VPNs slow you down, open security gaps, and kill user experience. It’s time for a smarter way to connect — fast, secure, and built for the cloud era. Netskope One Private Access is Zero Trust access without the pain. No tunnels. No guesswork. Just instant access to the apps your users need — from anywhere. What you get: Direct, high-speed access to cloud and legacy apps Zero Trust security with zero VPN credentials to steal Full visibility and control over private app traffic It’s time to rethink remote access.

Patching without the pain: How Tines and Kandji simplify updates securely and at scale

Patching used to be routine. Now, it’s a race — with vulnerabilities, compliance demands, and constant updates pulling IT teams in every direction. For teams managing complex environments, especially those with a large Apple footprint, manual patching just can’t keep up. Join Kandji and Tines for a practical discussion on how top IT teams are using orchestration and automation to take control of patch management. You’ll learn how to reduce manual effort, minimize risk, and regain time for strategic work — all while keeping every endpoint secure and compliant.